A full-scale, real-world inspired secure enterprise network design, originally developed as the final project for CIS-221 (Principles of Information Systems Security) under Professor Talia Q at UFV.
This project simulates a production-ready, layered-security architecture that integrates:
- π VLAN segmentation
- π₯ Cisco ASA Firewall (DMZ, Inside, Outside)
- π Cloudflare protection + TLS/WAF/DDOS
- πΆ Secure Wireless via Cisco WLC + planned RADIUS
- π Role-based ACLs
- π§Ύ Centralized Syslog Auditing
- π HSRP high-availability Layer 3 core switch
- π§ VPN with MFA & split tunneling
- π¦ Full configuration exports (.pkt, .txt) for real-world testing
βοΈ Verified in Cisco Packet Tracer
| Folder/File | Description |
|---|---|
FinalProject-CIS221.pkt |
Full Packet Tracer topology |
Firewall_Config_Final_With_ACL.txt |
ASA Firewall configuration (with ACL rules) |
Layer3_Switch_Config_Final_With_ACL.txt |
L3 Core switch configuration |
Final Project - CIS-221.pdf |
Full writeup report with figures & topology |
Professor Talia Qβs deep teaching and hands-on labs sparked the entire vision behind this project.
His network forensics labs, Kali Linux demonstrations, and real-world insights into layered defense strategies fundamentally shaped this work.
His comprehensive VLAN architecture lectures and 3+ hour walkthrough on secure hierarchical designs laid the foundation for this networkβs structure.
πΊ Design and Implementation of a Secure Company Network System
π‘ With his guidance, I implemented: VLANs, ACLs, ASA Zones, WLC Wireless, DHCP, Inter-VLAN Routing, IP Phones, HSRP, NAT, EtherChannel, STP Guard, OSPF, SSH hardening β and more.
This project will evolve into a real-world AI-powered Security Monitoring & Forensics platform:
- π Real-time syslog analysis with LLMs
- π‘οΈ Intelligent alerting and automated diagnostics
- π Behavioral anomaly detection
- π AI-based vulnerability scans & threat recommendations
Stay tuned at HarrisonSec.com for updates.
Created by Harrison (Zhanxing) Guo, a 20+ year tech veteran exploring the intersection of AI + Security.
βSecurity is not a feature, but a posture.β